![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
DOS Attacks: Instigation and Mitigation
During the release of a new software product specialized to track spam, ACME SoftwareInc notice that there was not as much traffic as they hoped to receive. During furtherinvestigation, they found that they could not view their own website. At that moment, theVP of sales received a call from the company's broker stating that ACME Software Incstock fell 4 point due to lack of confidence. Several states away, spammers didn't like theidea of lower profit margins do to an easy to install spam blocking software so theythought they would fight back. Earlier that day, they took control of hundreds ofcompromised computers and used them as DoS zombies to attack ACME Software Inc'sInternet servers in a vicious act of cyber assault. During an emergency press conferencethe next morning, ACME Software Inc's CIO announced his resignation as a result of aseveral million dollar corporate loss. Scenarios like the one above happen a more then people think and are more costlythen most will admit. Denial of Service (DoS) attacks are designed to deplete theresources of a target computer system in an attempt to take a node off line by crashing oroverloading it. Distributed Denial of Service (DDoS) is a DoS attack that is engaged bymany different locations. The most common DDoS attacks are instigated through virusesor zombie machines. There are many reasons that DoS attacks are executed, and most ofthem are out of malicious intent. DoS attacks are almost impossible to prevent if you aresingled out as a target. It's difficult to distinguish the difference between a legitimatepacket and one used for a DoS attack. The purpose of this article is to give the reader with basic network knowledge abetter understanding of the challenges presented by Denial of Service attacks, how theywork, and ways to protect systems and networks from them. Instigation: Spoofing - Falsifying an Internet address (know as spoofing) is the method an attackeruses to fake an IP address. This is used to reroute traffic to a target network node or usedto deceive a server into identifying the attacker as a legitimate node. When most of usthink of this approach of hacking, we think of someone in another city essentiallybecoming you. The way TCP/IP is designed, the only way a criminal hacker or crackercan take over your Internet identity in this fashion is to blind spoof. This means that theimpostor knows exactly what responses to send to a port, but will not get thecorresponding response since the traffic is routed to the original system. If the spoofing isdesigned around a DoS attack, the internal address becomes the victim. Spoofing is usedin most of the well-known DoS attacks. Many attackers will start a DoS attack to drop anode from the network so they can take over the IP address of that device. IP Hijacking isthe main method used when attacking a secured network or attempting other attacks likethe Man in the Middle attack. SYN Flood - Attackers send a series of SYN requests to a target (victim). The targetsends a SYN ACK in response and waits for an ACK to come back to complete thesession set up. Instead of responding with an ACK, the attacker responds with anotherSYN to open up a new connection. This causes the connection queues and memory bufferto fill up, thereby denying service to legitimate TCP users. At this time, the attacker canhijack the system's IP address if that is the end goal. Spoofing the "source" IP addresswhen sending a SYN flood will not only cover the offender's tracks, but is also a methodof attack in itself. SYN Floods are the most commonly used DoS in viruses and are easyto write. See http://www.infosecprofessionals.com/code/synflood.c.txt Smurf Attack- Smurf and Fraggle attacks are the easiest to prevent. A perpetrator sends alarge number of ICMP echo (ping) traffic at IP broadcast addresses, using a fake sourceaddress. The "source" or spoofed address will be flooded with simultaneous replies (SeeCERT Advisory: CA-1998-01). This can be prevented by simply blocking broadcasttraffic from remote network sources using access control lists. Fraggle Attack - This types of attack is the same as a Smurf attack except using UDPinstead if TCP. By sending an UDP echo (ping) traffic to IP broadcast addresses, thesystems on the network will all respond to the spoofed address and affect the targetsystem. This is a simple rewrite of the Smurf code. This can be prevented by simplyblocking broadcast traffic from remote IP address. Ping of Death - An attacker sends illegitimate ICMP (ping) packets larger than 65,536bytes to a system with the intention of crashing it. These attacks have been outdated sincethe days of NT4 and Win95. Teardrop - Otherwise known as an IP fragmentation attack, this DoS attack targetssystems that are running Windows NT 4.0, Win95 , Linux up to 2.0.32. Like the Ping ofDeath, the Teardrop is no longer effective. Application Attack - Thess are DoS attacks that involve exploiting an applicationvulnerability causing the target program to crash or restart the system. Kazaa and Morpheus have a known flaw that will allow an attacker to consume allavailable bandwidth without being logged.See http://www.infosecprofessionals.com/code/kazaa.pl.txt Microsoft's IIS 5 SSL also has an easy way to exploit vulnerability. Most exploits likethese are easy to find on the Internet and can be copied and pasted as working code.There are thousands of exploits that can be used to DoS a target system/application. Seehttp://www.infosecprofessionals.com/code/IIS5SSL.c.txt Viruses, Worms, and Antivirus - Yes, Antivirus. Too many cases where the antivirusconfiguration is wrong or the wrong edition is installed. This lack of foresight causes anunintentional DDoS attack on the network by taking up valuable CPU resources andbandwidth. Viruses and worms also cause DDoS attacks by the nature of how theyspread. Some purposefully attack an individual target after a system has been infected.The Blaster worm that exploits the DCOM RPC vulnerability (described in MicrosoftSecurity Bulletin MS03-026) using TCP port 135 is a great example of this. The Blastertargeted Microsoft's windows update site by initiating a SYN FLOOD. Because of this,Microsoft decided to no longer resolve the DNS for 'windowsupdate.com'. DoS attacks are impossible to stop. However, there are things you can do tomitigate potential damages they may cause to your environment. The main thing toremember is that you always need to keep up-to-date on the newest threats. Mitigation: Antivirus software - Installing an antivirus software with the latest virus definitions willhelp prevent your system from becoming a DoS zombie. Now, more then ever, this is animportant feature that you must have. With lawsuits so prevalent, not having the properprotection can leave you open for downstream liability. Software updates - Keep your software up to date at all times. This includes antivirus,email clients, and network servers. You also need to keep all network Operating Systemsinstalled with the latest security patches. Microsoft has done a great job with makingthese patches available for their Windows distributions. Linux has been said to be moresecure, but the patches are far more scarce. RedHat is planning on incorporating theNSA's SE Linux kernel into future releases. This will give Mandatory Access Control(MAC) capabilities to the Linux community. Network protection - Using a combination of firewalls and Intrusion Detection Systems(IDS) can cut down on suspicious traffic and can make the difference between loggedannoyance and your job. Firewalls should be set to deny all traffic that is not specificallydesigned to pass through. Integrating an IDS will warn you when strange traffic is presenton your network. This will assist you in finding and stopping attacks. Network device configuration - Configuring perimeter devices like routers can detectand in some cases prevent DoS attacks. Cisco routers can be configured to activelyprevent SYN attacks starting in Cisco IOS 11.3 and higher using the TCP interceptcommand in global configuration mode. Access-list number {deny | permit} tcp any destination destination-wildcardip tcp intercept list access-list-numberip tcp intercept ? (will give you a good list of other options.) Cisco routers can prevent Smurf and Fraggle attacks by blocking broadcast traffic. SinceCisco IOS 12.0, this is the default configuration. ACLs or access control lists should alsobe configured on all interfaces. No ip directed-broadcast The Cisco router can also be used to prevent IP spoofing.ip access-group list in interfaceaccess-list number deny icmp any any redirectaccess-list number deny ip 127.0.0.0 0.255.255.255 anyaccess-list number deny ip 224.0.0.0 31.255.255.255 anyaccess-list number deny ip host 0.0.0.0 anySee Improving Security on Cisco Routers - www.cisco.com/warp/public/707/21.html Old Cisco IOS versions are vulnerable to several DoS attacks. The "Black Angels" wrotea program called Cisco Global Exploiter. This is a great software to use when testing thesecurity of your Cisco router version and configuration and can be found athttp://www.blackangels.it/Projects/cge.htm Security is not as mystical as people believe. DoS attacks come in many differenttypes and can be devastating if you don't take the proper precautions. Keep up to date andtake steps to secure network nodes. Keeping security in mind can minimize damages,downtime, and save your career. Security Resources: Author: Jeremy Martin CISSP, ISSMP, ISSAP, CEI, CEH, CHS-III, CCNA, Network+, A+http://www.infosecwriter.com Member of:
MORE RESOURCES: Rewind and Reconnoiter: Is Climate Security Out in the Cold in the U.S. Intelligence Community? War on the Rocks Italian police increase security at Tesla dealerships after 17 cars destroyed in Rome fire The Guardian Law Firms Fear Trump Orders Could Affect Security Clearances of Lawyers Who Are Military Reservists Military.com DHS arrests man in McKinney accused of making terroristic threats against Homeland Security Secretary, ICE NBC 5 Dallas-Fort Worth Kirtland Security Forces Detective Trains with APD to Strengthen Investigative Skills, Partnerships afgsc.af.mil AWS achieves Cloud Security Assurance Program (CSAP) low-tier certification in AWS Seoul Region Amazon Web Services Trump's national security adviser reportedly used his personal Gmail account to do government work TechCrunch Milwaukee's Brady Street businesses increase security to improve safety FOX6 News Milwaukee DOJ grant supports study of the effects of school security equipment on student outcomes George Mason University Netanyahu says Israel will establish a new security corridor across Gaza to pressure Hamas - AP News Apple Head of Global Security found not guilty in bribery trial tied to concealed gun permits NBC Bay Area Space Security Sentinel Via Satellite Planning for your IAM Roles Anywhere deployment Amazon Web Services Mike Waltz’s team set up at least 20 Signal chats for national security work – report The Guardian Waltz and staff used Gmail for government communications, officials say The Washington Post Law firms fear Trump orders could affect security clearances of lawyers who are military reservists ABC News Oracle's masterclass in breach comms: Deny, deflect, repeat theregister.com I sent hundreds of cold emails to find a US VC firm that would hire me as an immigrant. I'm glad I ended up at a small company. Business Insider National Security Space Association's Marc Berkowitz Nominated to Serve as Assistant Secretary of Defense Space Coast Daily Opinion: Alaska can increase its food security without an agriculture department Anchorage Daily News NYPD boosts synagogue security ahead of Passover as anti-Jewish crimes 'jump off the page' New York Post Apple security chief acquitted, mistrial for ex-undersheriff in Santa Clara County gun permit bribery case The Mercury News New allegations against the White House’s Waltz suggest Signal chat scandal isn’t over MSNBC News Israel's security is America's security. Americans should not ignore that - opinion The Jerusalem Post Opinion: Trump’s casual response to his administration’s security lapse Chattanooga Times Free Press CyberQP Releases Groundbreaking Zero Trust Helpdesk Security Platform to Eliminate Standing Privileges Yahoo Finance Charges Filed Against Former PUSD Security Guard Pasadena Now HPD, Homeland Security bust multiple game rooms FOX 26 Houston New security system coming to Alaska’s Capitol building Your Alaska Link Glencoe based Security Bank & Trust Co. expands reach in Minnesota McLeod County Chronicle Parliament speaker Stefanchuk blocks Poroshenko’s US trip to international security conference, party says The Kyiv Independent ISC West 2025 Show Floor Spotlight: BOSCH SECURITY AND SAFETY SYSTEMS Security Info Watch National security implications of tariff announcement LiveNOW from FOX Security by Design Requires Organizational Commitment BankInfoSecurity Security forces report 80% drop in Ramadan terror attacks, after West Bank crackdown The Times of Israel Women in Security: Alice DiSanto, VP of Marketing, Autonomous Solutions Inc. Security Sales & Integration Security firm Brinks Home sells Lancaster city location LancasterOnline ISC West 2025 Show Floor Spotlight: PROMETHEUS Security Info Watch When will your Social Security benefits arrive in April? See 2025 payment schedule Democrat and Chronicle Coral Gables commissioner raises concerns for security of elected officials NBC 6 South Florida Kratos Defense & Security Solutions (NasdaqGS:KTOS) Breaks Ground On New Hypersonic Facility Yahoo Finance Pasadena school security officer accused of duct-taping 11-year-old girl's mouth shut for 'talking too much' ABC7 Los Angeles Secure Passage and Sunflower Labs take security to the skies with autonomous drone integration Police1 Contrast Security Debuts 'Channel-First' Strategy Channel Futures Marlink New Cyber Company to Meet Customer Demand for Security & Compliance - The Maritime Executive Marlink New Cyber Company to Meet Customer Demand for Security & Compliance The Maritime Executive Why Active Directory’s 25-Year Legacy Is a Security Issue BankInfoSecurity Diversus Health adds new Security-Widefield location FOX21 News Colorado Northwest Dallas security guard fatally shoots man outside motel FOX 4 News Dallas-Fort Worth Oracle Cloud security SNAFU latest: IT giant accused of pedantry as evidence scrubbed theregister.com Fight at maximum security unit precedes tour by state’s prison work group South Dakota Searchlight 2025 SAMMY Awards Winners Honored at ISC West 2025 Security Sales & Integration |
![]() |
![]() |
![]() |
RELATED ARTICLES
5 Simple Steps to Protect your Digital Downloads A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. How To Be Your Own Secret Service Agency So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance. Avoid Internet Theft, Fraud and Phishing Since its birth, the Internet has grown and expanded to unprecedented, unmanageable proportions. Information, software, news, and much more flow freely through its twisted pathways. Burning Bridges is Bad, But Firewalls are Good When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker. Identity Theft Article - A Phisher Is Trying To Steal Your Identity! Sooner or later everyone with an email account will receive a phishing attempt from some internet scammer. What is phishing? How can you protect yourself? These are some of the questions this identity theft article will provide, along with some free resources and practical advice on how to protect your online identity. The 5 Critical Steps to Protecting Your Computer on the Internet Spyware, viruses and worms.. 8 Surefire Ways to Spot an E-Mail Identity Theft Scam! The E-Mail Identity Theft Scam is running Rampant. These E-Mail Scam artists will go to great lengths to Get Your Bank Account information and Steal your Identity. Three-pronged Trojan Attack Threatens Security on the Internet Glieder (Win32.Glieder. Top 10 tips for Safe Internet Shopping Over £5 billion pounds was spent on online shopping in 2004. The Internet was the fastest growing retail sector last year, attracting one in four shoppers. Phishing - Identity Theft & Credit Card Fraud What is Phishing?Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information. Consumers: Shop Online and Get Information Safely Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker. The Top Twelve Threats No Computer User Should Ignore The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties. Internet Small Business and Fraud Be careful of sites that promise to send you "instant pins". These companies usually have lax credit card security and can afford customer charge backs from fraudulent transactions. What to Look for before You Purchase Spyware Software Huge number of spyware software applications are available in the market, some being offered as shareware while rest as freeware. (Shareware means a software available for download / CD, and can be used for a particular length of time, usually 30 days. How Free Scripts Can Create Security Problems With the Internet entering our lives in such an explosive manner, it was inevitable that Internet security issues would follow as well. While credit card frauds are an offline security problem that has been carried over to the Internet as well, spamming and phishing are uniquely Internet security hazards. Money Mule Email Scam Hits U.S. Imagine this - you open up your email box and an international company is offering you a dream job - you can be an agent for them - a financial intermediary - receiving payments for them and transferring money to them, and, naturally, keeping a commission on each transaction.There's no investment, no money required. Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking Airport Menace: The Wireless Peeping Tom----------------------------------------As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home. Another Fine Mess! I'm in the Anti-Spyware business, and I'm doing a lot of advertising to promote my website, but here I am online and on the phone, giving my personal information to.. Protect Your Little Black Book The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. Online Shoppers, Beware of a New Scam Beware of a New Scam Aimed at Bargain-HuntersTrying to buy something cheap is absolutely natural--and online crooks set traps for unwitting bargain-hunters. On April 6 Panda Software warned Internet users of a new particularly brazen scam aimed at stealing confidential information. ![]() |
home | site map |
© 2006 |